In-Progress Spring 2026
Cybersecurity Techniques and Operations
Provides hands-on training in real-world cyber operations and defensive security techniques. The course emphasizes practical cybersecurity tools, vulnerability analysis, penetration testing, and network defense within a controlled lab environment.
Students engage directly with traffic tracing, firewall configuration, network scanning, exploitation frameworks, password cracking techniques, wireless security analysis, and digital steganography. The course bridges foundational networking knowledge with applied offensive and defensive security operations.
Through structured labs and applied exercises, CYSE 301 develops operational competency in identifying, analyzing, and mitigating vulnerabilities across modern computing environments.
Key Skills & Topics
Network Traffic Analysis
- Packet inspection using Wireshark and tshark
- Traffic tracing and network behavior analysis
- Identification of suspicious activity in network environments
Vulnerability Scanning & Defense
- Network scanning with Nmap
- Firewall configuration using pfSense
- Evaluation of system vulnerabilities
- Implementation of defensive countermeasures
Penetration Testing & Exploitation
- Introduction to ethical hacking methodologies
- Metasploit Framework usage
- Attack vector enumeration
- Controlled exploitation techniques
Authentication & Password Security
- Password storage mechanisms
- Password cracking techniques
- Wi-Fi security vulnerabilities
- Wireless traffic decryption methods
Applied Cryptography & Steganography
- Cryptographic tools and protocol fundamentals
- Exploitation of weak implementations
- Digital steganography using s-tool and steghide